Back
 JSIP  Vol.2 No.3 , August 2011
Image Encryption Based on the General Approach for Multiple Chaotic Systems
Abstract: In the recent years, researchers developed image encryption methods based on chaotic systems. This paper proposed new image encryption technique based on new chaotic system by adding two chaotic systems: the Lorenz chaotic system and the Rössler chaotic system. The main advantage of this technique is stronger security, as is shown in the encryption tests.
Cite this paper: nullQ. Alsafasfeh and A. Arfoa, "Image Encryption Based on the General Approach for Multiple Chaotic Systems," Journal of Signal and Information Processing, Vol. 2 No. 3, 2011, pp. 238-244. doi: 10.4236/jsip.2011.23033.
References

[1]   Z. Guan, F. Huang and W. Guan, “Chaos-Based Image Encryption Algorithm,” Physics Letters A, Vol. 346, No. 1-3, 2005, pp. 153-157. doi:10.1016/j.physleta.2005.08.006

[2]   H. H. Nien, C. K. Huang, S. K. Changchien, H. W. Shieh, C. T. Chen and Y. Y. Tuan, “Digital Color Image Encoding and Decoding Using a Novel Chaotic Random Generator,” Chaos Solitons and Fractals, Vol. 32, No. 3, 2005, pp. 1070-1080. doi:10.1016/j.chaos.2005.11.057

[3]   Q. Alsafasfeh and A. Alshabatat, “Image Encryption Based on Synchronized Communication Chaotic Circuit,” Journal of Applied Sciences Research, Vol. 7, No. 4, 2011, pp. 392-399.

[4]   H. Gao, Y. Zhang, S. Liang and D. Li, “A New Chaotic Algorithm for Image Encryption,” Chaos Solitons and Fractals, Vol. 29, No. 2, 2006, pp. 393-399. doi:10.1016/j.chaos.2005.08.110

[5]   C. Fu, Z. Zhang and Y. Cao, “An Improved Image Encryption Algorithm Based on Chaotic Maps,” Third International Conference on Natural Computation, Vol. 3, Washington, 2007, pp. 24-27.

[6]   L. Zhang, X. Liao and X. Wang, “An Image Encryption Approach Based on Chaotic Maps,” Chaos Solitons and Fractals, Vol. 24, No. 3, 2005, pp. 759-765. doi:10.1016/j.chaos.2004.09.035

[7]   S. Bu and B. Wang, “Improving the Security of Chaotic Encryption by Using a Simple Modulating Method,” Chaos Solitons and Fractals, Vol. 19, No. 4, 2003, pp. 919-924. doi:10.1016/S0960-0779(03)00260-1

[8]   X. Wu, H. Hu and B. Zhang, “Analyzing and Improving a Chaotic Encryption Method,” Chaos Solitons and Fractals, Vol. 22, No. 2, 2004, pp. 367-373. doi:10.1016/j.chaos.2004.02.009

[9]   G. Chen, Y. Mao and C. K. Chui, “A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps,” Chaos Solitons and Fractals, Vol. 21, No. 3, 2003, pp. 749-761. doi:10.1016/j.chaos.2003.12.022

[10]   F. Chiaraluce, L. Ciccarelli, E. Gambi, P. Pierleoni and M. Reginelli, “A New Chaotic Algorithm for Video Encryption,” IEEE Transactions on Consumer Electronics, Vol. 48, No. 4, 2002, pp. 838-844. doi:10.1109/TCE.2003.1196410

[11]   K. Wong, B. Kwok and W. Law, “A Fast Image Encryption Scheme Based on Chaotic Standard Map,” City University of Hong Kong, Hong Kong.

[12]   L. Wang, Q. Ye, Y. Xiao, Y. Zou and B. Zhang, “An Image Encryption Scheme Based on Cross Chaotic Map,” Congress on Image and Signal Processing, Sanya, 27-30 May 2008, pp. 27-26.

[13]   Q. Alsafasfeh and M. Alarni, “A New Chaotic Attractor from Lorenz and Rossler Systems and Its Electronic Experimental Implementation,” Circuits and Systems, Vol. 2, No. 2, 2011, pp. 101-105. doi:10.4236/cs.2011.22015

[14]   T. Ga and Z. Chen, “Image Encryption Based on a New Total Shuffling Algorithm,” Chaos Solitons & Fractals, Vol. 38, No. 1, 2008, pp. 213-220. doi:10.1016/j.chaos.2006.11.009

[15]   N. K. Pareek, V. Patidar and K. K. Sud, “Image Encryption Using Chaotic Logistic Map,” Image and Vision Computing, Vol. 24, No. 9, 2006, pp. 926-934. doi:10.1016/j.imavis.2006.02.021

[16]   V. Patidar, N. K. Pareek and K. K. Sud, “A New Substitution-Diffusion Based Image Encrypete Using Chaotic Standard and Logistic Maps,” Communications in Non-Linear Science and Numerical Simulation, Vol. 14, No. 7, 2009, pp. 3056-3075. doi:10.1016/j.cnsns.2008.11.005

 
 
Top